3
0
Fork 0
forked from mirrors/nixpkgs
nixpkgs/nixos/modules/services/security
Ivan Kozik d95960e275 nixos/bitwarden_rs: fix startup on 32 thread machines
LimitNPROC=64 is too low for bitwarden_rs to start on a 32 thread machine.
Remove the limit.

This fixes:

```
bitwarden_rs[38701]: /--------------------------------------------------------------------\
bitwarden_rs[38701]: |                       Starting Bitwarden_RS                        |
bitwarden_rs[38701]: |--------------------------------------------------------------------|
bitwarden_rs[38701]: | This is an *unofficial* Bitwarden implementation, DO NOT use the   |
bitwarden_rs[38701]: | official channels to report bugs/features, regardless of client.   |
bitwarden_rs[38701]: | Send usage/configuration questions or feature requests to:         |
bitwarden_rs[38701]: |   https://bitwardenrs.discourse.group/                             |
bitwarden_rs[38701]: | Report suspected bugs/issues in the software itself at:            |
bitwarden_rs[38701]: |   https://github.com/dani-garcia/bitwarden_rs/issues/new           |
bitwarden_rs[38701]: \--------------------------------------------------------------------/
bitwarden_rs[38701]: [INFO] No .env file found.
bitwarden_rs[38701]: [2021-05-24 03:34:41.121][bitwarden_rs::api::core::sends][INFO] Initiating send deletion
bitwarden_rs[38701]: [2021-05-24 03:34:41.122][start][INFO] Rocket has launched from http://127.0.0.1:8222
bitwarden_rs[38701]: [2021-05-24 03:34:41.126][panic][ERROR] thread 'unnamed' panicked at 'failed to spawn thread: Os { code: 11, kind: WouldBlock, message: "Resource temporarily unavailable" }': /build/rustc-1.52.1-src/library/std/src/thread/mod.rs:620
bitwarden_rs[38701]:    0: bitwarden_rs::init_logging::{{closure}}
bitwarden_rs[38701]:    1: std::panicking::rust_panic_with_hook
bitwarden_rs[38701]:    2: std::panicking::begin_panic_handler::{{closure}}
bitwarden_rs[38701]:    3: std::sys_common::backtrace::__rust_end_short_backtrace
bitwarden_rs[38701]:    4: rust_begin_unwind
bitwarden_rs[38701]:    5: core::panicking::panic_fmt
bitwarden_rs[38701]:    6: core::result::unwrap_failed
bitwarden_rs[38701]:    7: hyper::server::listener::spawn_with
bitwarden_rs[38701]:    8: hyper::server::listener::ListenerPool<A>::accept
bitwarden_rs[38701]:    9: std::sys_common::backtrace::__rust_begin_short_backtrace
bitwarden_rs[38701]:   10: core::ops::function::FnOnce::call_once{{vtable.shim}}
bitwarden_rs[38701]:   11: std::sys::unix:🧵:Thread:🆕:thread_start
bitwarden_rs[38701]:   12: start_thread
bitwarden_rs[38701]:   13: __GI___clone
bitwarden_rs[38701]: [2021-05-24 03:34:41.126][panic][ERROR] thread 'main' panicked at 'internal error: entered unreachable code: the call to `handle_threads` should block on success': /build/bitwarden_rs-1.20.0-vendor.tar.gz/rocket/src/rocket.rs:751
bitwarden_rs[38701]:    0: bitwarden_rs::init_logging::{{closure}}
bitwarden_rs[38701]:    1: std::panicking::rust_panic_with_hook
bitwarden_rs[38701]:    2: std::panicking::begin_panic_handler::{{closure}}
bitwarden_rs[38701]:    3: std::sys_common::backtrace::__rust_end_short_backtrace
bitwarden_rs[38701]:    4: rust_begin_unwind
bitwarden_rs[38701]:    5: core::panicking::panic_fmt
bitwarden_rs[38701]:    6: rocket:🚀:Rocket::launch
bitwarden_rs[38701]:    7: bitwarden_rs::main
bitwarden_rs[38701]:    8: std::sys_common::backtrace::__rust_begin_short_backtrace
bitwarden_rs[38701]:    9: std::rt::lang_start::{{closure}}
bitwarden_rs[38701]:   10: std::rt::lang_start_internal
bitwarden_rs[38701]:   11: main
```
2021-05-24 04:36:17 +00:00
..
bitwarden_rs nixos/bitwarden_rs: fix startup on 32 thread machines 2021-05-24 04:36:17 +00:00
certmgr.nix
cfssl.nix
clamav.nix nixos/clamav: add settings options to replace extraConfig options 2020-12-11 19:56:08 -05:00
fail2ban.nix nixos/fail2ban: add extraPackages option 2021-04-24 18:14:56 +02:00
fprintd.nix nixos/fprintd: add TOD support 2021-04-15 08:55:39 +02:00
fprot.nix nixos/fprot: add type 2021-01-28 14:12:15 -08:00
haka.nix
haveged.nix nixos/modules: remove trailing whitespace 2020-08-07 14:45:39 +01:00
hologram-agent.nix treewide: remove nand0p as maintainer 2021-05-17 01:50:49 +02:00
hologram-server.nix nixos/*: use $out instead of $bin with buildGoPackage 2020-04-28 20:30:29 +10:00
munge.nix
nginx-sso.nix nixos/nginx.sso: add package option 2020-01-12 14:35:23 +01:00
oauth2_proxy.nix nixos/oauth2_proxy: fix package name in nixos module 2021-04-18 14:21:38 +02:00
oauth2_proxy_nginx.nix nixos/oauth2_proxy_nginx: add nginx config only if oauth2_proxy is enabled. 2021-05-03 11:23:03 -07:00
physlock.nix Merge pull request #85963 from seqizz/g_physlock_message 2020-08-27 10:18:34 +02:00
privacyidea.nix nixos/users: require one of users.users.name.{isSystemUser,isNormalUser} 2021-04-14 20:40:00 +02:00
shibboleth-sp.nix
sks.nix
sshguard.nix nixos/sshguard: restart sshguard when services/backend changes 2021-04-23 16:16:37 +02:00
step-ca.nix Add mohe2015 as maintainer to step-ca and nixos/step-ca 2021-04-09 14:57:43 +02:00
tor.nix nixos/tor: fix HidServAuth (#122439) 2021-05-11 10:10:32 +02:00
torify.nix
torsocks.nix
usbguard.nix treewide: fix double quoted strings in meta.description 2021-01-24 19:56:59 +07:00
vault.nix nixos/vault: extraConfigPaths -> extraSettingsPaths 2021-01-19 18:14:29 +01:00
yubikey-agent.nix nixos/yubikey-agent: add missing mkIf 2020-07-26 09:34:24 +02:00